Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Avoidance of Integrated Attacks on MANET using Trusted Hyperbolic AODV Routing Protocol

Ashish Kumar Jain, Vrinda Tokekar, Upendra Singh2

Abstract


A mobile ad-hoc network (MANET) is a wireless network such that nodes can move dynamically in an infrastructure less network. In reality, MANET may face challenges because of combination of attacks like collaborative black hole, wormhole, flooding and grey hole etc. We have used the term integrated attacks to show the combination of attacks in three different scenarios created. In order to enhance the network performance and eliminate malicious nodes from MANET, trust based routing is applied in which trust computation is done using hyperbolic secant (SecH) function. SecH is used to calculate the trust value among the nodes of MANET. This paper instigates to detect and avoid malicious nodes formed in three different scenarios of integrated attacks. Network metrics like throughput, packet delivery ratio and end to end delay are calculated for proposed protocol trusted hyperbolic AODV routing protocol (THAODV). The result shows performance improvement compared to standard AODV protocol in these three scenarios of integrated attacks.

Cite this Article Ashish Kumar Jain, Vrinda Tokekar, Upendra Singh. Detection and Avoidance of Integrated Attacks on MANET using Trusted Hyperbolic AODV Routing Protocol. Journal of Mobile Computing, Communications & Mobile Networks. 2016; 3(2): 21–34p. 


Keywords


Integrated attacks, secant hyperbolic function, THAODV, fuzzy discrimination

Full Text:

PDF

References


Jain A, Tokekar V. Classification of Denial of Service Attacks in Mobile Ad Hoc Networks. Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN). 2011; 256–261p.

Bo Yang, Yamamoto R, Tanaka Y. Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs. 16th International Conference Advanced Communication Technology (ICACT), IEEE. 2014; 223–232p.

Deepika Kukreja, Umang Singh, Reddy BVR. Analytical Models for Trust Based Routing Protocols in Wireless Ad Hoc Networks. ACM SIGSOFT Software Engineering Notes (SEN). Jul 2012; 37(4).

Jain A, Tokekar V. Mitigating the Effects of Black Hole Attacks on AODV Routing Protocol in Mobile Ad Hoc Networks. International Conference on Pervasive Computing (ICPC), IEEE. 2015; 1–6p.

Shanmuganathan V, Anand T. A Survey on Gray Hole Attack in MANET. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC). Dec 2012; 2(6). ISSN: 2250-3501.

Issa Khalil, Saurabh Bagchi, Shroff Ness B. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. www.elsevier.com/locate/adhoc.

Alsumayt, Haggerty A, Lotfi J. A Comparison of the MrDR method against different DoS attacks in MANETs. Digital Information Processing and Communications (ICDIPC), Fifth International Conference, IEEE. 2015; 219–224p.

Prasenjit Choudhury, Alokparna Bandyopadhyay, Satyanarayana Vuppala. A Simulation Analysis of Flooding Attack in MANET using NS-3. 978-1-4577-07872/11/$26.00 ©2011 IEEE.

Revathi Venkataraman, Pushpalatha M, Rishav Khemka, et al. Prevention of Flooding Attacks in Mobile Ad Hoc Network. International Conference on Advances in Computing, Communication and Control (ICAC3’09).

Pushpita Chatterjee, Indranil Sengupta, Ghosh SK. A Distributed Trust Model for Securing Mobile Ad Hoc Networks.

-7695-4322-2/10 © 2010 IEEE.

Jaydip Sen, Girish Chandra M, Harihara SG, et al. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks. 1-4244-0983-7/07©2007 IEEE.

Martin J, Leo Manickam, Shanmugavel S. Fuzzy based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET. Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007). 0-76952889-9/07 © 2007.

Boppana RV, Xu Su. On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks. IEEE Trans Mobile Comput. 09 Nov 2010; 1162– 1174p.

Anna Lakshmi A, Valluvan KR. Support Vector Machine and Fuzzy-Based Intrusion Detection and Prevention for Attacks in MANETs. Int J Mobile Netw Des Innovat Archive. Nov 2015; 6(2): 63– 72p.

Alka Chaudhary, Tiwari VN. Design an Anomaly Based Fuzzy Intrusion Detection System for Packet Dropping Attack in Mobile Ad Hoc Networks. 978-1-47992572-8/14/_c IEEE. 2014.

Ashish Sharma , Dinesh Bhuriya, Upendra Singh, et al. Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing. International Journal of Computer Science and Information Technologies (IJCSIT). 2014; 5(4): 5201–5205p. ISSN 0975-9646.

Ping Yi, Yue Wu. Experimental Evaluation of Flooding Attacks in Mobile Ad Hoc Networks. Project Supported by National Natural Science Foundation of China (Grant No. 60803117), the National High Technology Development 863 Program of China, IEEE. 2009.

Kennelly Arthur E. The Application of Hyperbolic Functions to Electrical Engineering Problems. London: University of London Press.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/